Explore >> Select a destination


You are here

99firms.com
| | blog.arkadi.one
20.3 parsecs away

Travel
| | Self-hosting Made Easy(er)","You may have heard of the projects, Yunohost and Freedombox. They both aim to make it easier for regular humans to self-host services on their own computers or SBC (Single Board Computers) for themselves, their friends or family. I was motivated to write this post because of all the reviews of Freedombox I've seen on the web lately. I haven't seen even one review of Yunohost out there, and I think that's tragic because it is a great self-hosting alternative as well. Why self-host? That's a big question and outside the scope of this comparison of Yunohost and Freedombox, but remember ""There is no cloud, only someone else's computer."" If you truly want to take control of your own data and minimize being tracked by large corporations (Google, Apple, Facebook, Amazon, and Microsoft), then self-hosting might be something you might want to consider. My Experience and Current Setup with Yunohost & Freedombox I've been running Yunohost for about 6 months in my home. I am running it on regular desktop computer. Services/Apps I use on my Yunohost: ad blocking (Pi-Hole), storing files and syncing them to my computers (Nextcloud), calendar & contacts (Nextcloud), blogging (WriteFreely), downloading Bittorrent files (Transmission), RSS reader (TinyTiny RSS Reader), and search engine (Searx). I've tried some other apps on Yunohost but these are the ones I use on a daily basis. I have gone through the installation more than once because of a lost password (doh!), and trying it out on other computers.
| | dusted.codes
14.5 parsecs away

Travel
| | Watch US Netflix, Hulu and more from anywhere in the world
| | www.techtimes.com
10.8 parsecs away

Travel
| | Are VPNs in 2025 a must-have? If you are hesitant of subscribing to one, read this first to see how it could impact your online activities.
| | www.openedr.com
75.7 parsecs away

Travel
| EDR technology helps to monitor your devices to detect and respond to cyber threats. And it helps to find suspicious activity to eliminate threats rapidly.